Tulsa Enterprise for Cyber Innovation, Talent and Entrepreneurship (TECITE) - the university of - netdna-ssl.com
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Cybersecurity at TU A leader in cybersecurity research and education for more than 20 years NATIONAL SECURITY AGENCY CENTERS OF EXCELLENCE PROPOSED CAPABILITIES FOR THE UNIVERSITY OF TULSA (TU) n Information Assurance and Cyber Defense Education since 2000; one of the first 14 institutions INSURANCE INSTITUTE FOR CYBERSECURITY awarded this distinction n Information Assurance Research n Cyber Operations n Host Cyber Insurance ISAC (Information Sharing n Bridging the IT-Actuary Data Gap n One of the few universities awarded all 3 distinctions and Analysis Center) While insurers regularly lament the lack of reliable Currently, ISACs are sector-specific (financial services, cyberdata, it is not always obvious which additional data PATENTS automotive, health, etc.) and are dedicated to sharing would be helpful. This is due in large part to a lack of U.S. Patent No. 9,471,789, issued Oct. 18, 2016. Compliance method for a cyber-physical information about threat trends and coordinating sectoral mutual understanding between what the data IT specialists system. Inventors: J. Hale, P. Hawrylak, and M. Papa. responses. Insurers have interests in all of these sectors, face can collect (often operational in nature, only indirectly U.S. Patent No. 9,038,155, issued May 19, 2015. Auditable multi-claim security token. shared challenges in understanding emerging threats, and related to security posture or loss magnitude) and what Inventors: R. Gamble and R. Baird. could benefit from sharing experiences and data. A cyber actuaries need. TU can help break through this impasse insurance ISAC, hosted by TU, could meet this unmet by designing standardized methods for collecting relevant U.S. Patent No. 6,732,180, issued May 4, 2004. A method to inhibit the identification and need. cyberdata when claims do occur. This standardization can retrieval of proprietary media via automated search engines utilized in association with in turn be used to coordinate data collection across insurers computer compatible communications networks. Inventors: J. Hale and G. Manes. n Identifying Insured Risk Factors Better by Pooling and then the Institute can analyze the data to draw insights Proposal Form Responses Proposal forms seek to establish the cybersecurity posture on what factors truly affect risk of making cyber claims. EDUCATIONAL OPPORTUNITIES and risks facing prospective insured firms through n Public Incident Data Repository n Cyber Corps structured questions about security controls, data held, etc. When cybersecurity incidents occur at public companies, - NSF Scholarship-For-Service and DoD Information Assurance Scholarship Programs To date, insurance companies have struggled to identify they are often reported on in the media or in regulatory - More than 350 graduates placed in government positions questions that reliably predict whether a claim is more or filings. TU can collect a curated, ongoing list of publicly- n MS in Cybersecurity Professional Track degree offered online along with a traditional less likely to be subsequently made. This challenge could reported cyber incidents by automatically mining various residential program be for two reasons: (1) the questions need to be refined or sources. This data can be used by center supporters to n Undergraduate Exposure in Cybersecurity (2) additional claims data is required. TU can provide the improve their own offerings. - Substantial curriculum offerings mechanisms to address both concerns. First, by aggregating - Research engagement through funded support and the Tulsa Undergraduate Research n Cybersecurity Training for Underwriters Challenge proposal form responses and claims data across companies It is essential for underwriters to stay abreast of the and conducting statistical analysis to identify discriminating - Minor that attracts undergraduate students from computer science, engineering and changing threat landscape, available security controls and business questions. Second, by suggesting how to refine questions in defensive best practices. TU can offer regular training light of the analysis. courses (online or on-campus) with curriculum that is RESEARCH n Clearinghouse for Loss Data customized to the needs of underwriters. n Interdisciplinary research projects funded by AFRL, DHS, DOE, NSF and private Cyber insurance claims take varied forms, many of which n Cybersecurity Training for Boards/Leadership of industry are rapidly changing in response to evolving attacker and Insured Clients - Wearable and Internet of Things (IoT) Device Security defender strategies. Yet the data on different types of cyber Insurance companies can mitigate their own risks by - Security Assurance for Autonomous and Self-Adaptive Systems claims are frequently spotty, necessitating reliance on ensuring their clients are educated and well-informed on - Heavy vehicle cybersecurity research loss distributions borrowed from other types of coverage. how to manage cyber risks. TU can offer regular training - U.S. Critical Infrastructure Protection Research (oil & gas, nuclear, and the power grid) Insurers can benefit from improved data on cyber losses. courses (online or on-campus) with curriculum that is - Security Economics Lab With the clearinghouse hosted at TU receiving anonymized targeted to the executive and board levels. - Institute for Information Security (iSec) loss data from multiple insurers, TU can create technology that uses the data to build better loss distribution models. The resulting models would then be shared with Institute participants. T he U ni ver s i ty o f Tu l s a > 1
Business concept for a Tulsa cyber district PROBLEMS TO BE SOLVED. announcement of Amazon’s HQ2 to the Washington, D.C. Our country’s military, energy, financial, retail, insurance and area will pull existing computer science and cyberworkforce health digital information infrastructure face ever-increasing talent from D.C. area federal agencies to higher paying cyber-related attacks from foreign governments, rouge hackers Amazon jobs while driving up housing and living Belt-way and terrorist organizations with the potential for disastrous costs. impact on the defense of our nation, including our economy. Decision makers at major corporations and public institutions The sophistication of these cyberattacks continues to advance across the United States are not adequately informed in cyber- alongside these ever-increasing number of attacks, requiring a related issues to protect their companies and institutions. robust cyber research and innovation enterprise to stay steps Tulsa’s ahead of these attackers. UNIQUE SOLUTIONS TO THESE PROBLEMS: The quality of cyberprotection services, vendors and The Proposed Tulsa-based Tulsa Enterprise on Cyber Cyber District products is without a rating system. For example, within the Innovation, Talent and Entrepreneurship (TECITE) Department of Defense supply chain vendor contracts, a The University of Tulsa has a long-standing reputation signed attestation of meeting the Defense Federal Acquisition for excellence in cybersecurity with programs on campus Regulation Supplement (DFARS) cyberstandards is the supported by the National Security Administration, the Secret current state of quality assurance. Service, the U.S. Department of Defense, the U.S. Department There is an inadequate cyber-trained workforce to meet these of Energy, the U.S. Department of Transportation, the Federal B U S I N E S S C O N C E P T F O R F O U R C O - L O C AT E D challenges with an estimate of 350,000 open cyber positions Bureau of Investigation and the Defense Advanced Research CYBER CENTERS OF EXCELLENCE across the United States. One estimate is that by 2021, Project Agency (DARPA). more than 3,000,000 cyberdefense jobs will be needed. The EXECUTIVE SUMMARY – A new war is underway. A war and the near downtown Tulsa Opportunity Zone along 6th fought among nations, organized terror cells and individual Street. The proposal leverages The University of Tulsa’s TULSA’S 6TH STREET CORRIDOR OPPORTUNITY ZONE hackers, against our national defense systems. A war against 20-year history as the lead supplier of Top Secret Security our banking, retail, health and energy business sectors. Clearance talent to federal agencies and as a national center The sophistication of these attacks continues to advance. of excellence in cyberdefense education and research. All Currently 350,000 cyberdefense positions are available in of this is an effort to significantly grow additional cyber the United States with projections for exponential growth workforce and innovations in Tulsa. in needed cyberdefense workforce. For many of these cyber Specifically, we propose four co-located Centers of Excellence; positions, the candidates must meet Top Secret Security a National Science Foundation funded Engineering Research Clearance level standards. There is a need to expand cyber Center at The University of Tulsa focused on cybersecurity, research, innovation and entrepreneurship to stay well ahead a Multi-Federal Agency Cybersecurity Center of Excellence of the “bad guys.” There is great need to ensure the quality with an initial focus would be the Department of Defense of cyberservices, vendors and products in supply chains, Supply Chain safety and security, a Cybersecurity Insurance manufactured products and cyber insurance ratings. Institute to gather and analyze data on cyber risks, and a This proposal asks for the creation of a Tulsa Enterprise for Consortium of Business Sectors in banking, energy, retail, Cyber Innovation, Talent and Entrepreneurship (TECITE.) health and transportation focused on cyber defense research The backbone of this enterprise is a set of co-located cyber and innovation. We propose the co-location of these centers centers of excellence that link industry, federal agencies and of excellence along the 6th Street Opportunity Zone The University of Tulsa in a united effort in defense of our Corridor, linking downtown Tulsa with The University of information systems. The proposal takes advantage of Tulsa’s Tulsa. low cost of living, ability to recruit and retain young talent 2 < THE UN I V E R SI T Y OF T U LSA T H E U N I V E R SI T Y O F T U L SA > 3
With the cyberinformation security needs of our nation Small Business Innovation Research (SBIR) grants, Small dramatically increasing, we propose a bold, Tulsa-based Business Technology Transfer (STTR) grants and the NSF T U L S A E N T E R P R I S E O N C Y B E R I N N O V AT I O N , TA L E N T A N D E N T R E P R E N E U R S H I P cyber-focused enterprise that brings together industry and Innovation Corps (I-Corps) Program. federal agencies around cybersecurity centers of excellence and takes advantage of: 3. Federal Agency Support; with a proposed U.S. Government Multi-agency Cyber Center of n The University of Tulsa’s long-standing expertise in Excellence in Tulsa as a Federal Anchor – partnered cyberdefense. with The University of Tulsa on Cyber research, defense, n The University of Tulsa’s proven ability to train a and workforce expansion would be several federal agencies cyberworkforce that secures top secret security clearances. such as U.S. Department of Defense, U.S. Department We estimate that The University of Tulsa has trained the of Homeland Security, U.S. Department of Energy, U.S. greatest number of NSA cyber experts by a factor of 3 over Department of Transportation, the U.S. Department of the next leading university. We have sent nearly 350 TU Commerce and their National Institute of Standards and cyber graduates to work in federal agencies. Technology and the Manufacturing Extension Program. n Tulsa’s available workforce from The University of Tulsa’s expanding programs in the digital sciences. 4. Insurance Institute for Cyber Safety(IICS) n Tulsa’s low cost of living – currently 11% lower cost of Anchor – In 1894, U.S. insurance companies came living than the national average. together to create the Underwriters Laboratories (UL), n Tulsa’s emerging reputation for young talent recruitment with headquarters in Northbrook, IL, to provide safety and retention and start ups. analyses and safety ratings of new technologies. Insurance n The inclusion of The University of Tulsa in an companies collaborated again in 1959 to create the Opportunity Zone. Insurance Institute for Highway Safety (IIHS) with headquarters in Arlington, VA, to rate motor vehicle safety. This bold initiative serves to solve the following problems: The proposed Insurance Institute for Cyber Safety (IICS) n Increase workforce with talent in cybersciences. would again bring together insurance companies to assess n Increase workforce with credentials to achieve top secret and rate cybersecurity risk. security clearance status. n Increase research and innovations in the cybersciences. 5. Business Sector Consortium on Cyberprotection n Create new Tulsa-based startups and scaleups in cyber- Anchor – The University of Tulsa has alumni and trustees related industries. in leadership positions in energy, banking, credit rating and n Protect existing business sectors with specific financial security, global retail, trucking and aviation. This cyberprotection programs. consortium would allow these business sectors to regularly inform cybersecurity system developers of their risks and We propose to solve these problems through the creation of needs. Tulsa’s Cyber District and a new Tulsa Enterprise on Cyber Innovation, Talent and Entrepreneurship (TECITE). This enterprise, located in the Cyber District, would have seven 6. City of Tulsa Anchor – The 6th Street Corridor between downtown Tulsa’s East Village, to the Pearl Tulsa market analysis anchors: District to the Kendall Whittier Neighborhood to The This is the right time for investment in this Tulsa-based A WORLD-CLASS PARK – The Gathering Place has University of Tulsa’s Cyber District is primed for further focused expansion. Past private and public investments have exceeded even the loftiest expectations in bringing Tulsa area 1. Academic; with The University of Tulsa as an redevelopment. It is close to downtown and The University provided Tulsa with great momentum to develop, attract and residents together. Academic Anchor – with cyber-affiliated undergraduate, of Tulsa, has lower priced land values and allows a mix of retain young talent for the knowledge economy: graduate and certificate programs. Includes TU’s housing, retail, startup businesses, scaleup businesses as well IMPROVING TRANSPORTATION – New transportation Computer Sciences, Electrical Engineering, Computer as new cyber training and research facilities. DOWNTOWN TULSA AND BROKEN ARROW ROSE options have arrived including improved bikeways, e-scooters Engineering, Computer Information Systems, Industrial DISTRICT – These downtown cores have been redeveloped and soon Rapid Bus Transit. Organizational Psychology, Entrepreneurship, Finance, 7. Opportunity Zone Investment – Created through with world-class sports and entertainment venues, a vibrant COST OF LIVING – Tulsa’s housing costs are 11% below Data Analytics and Quantitative Finance programs. the Tax Cut and Jobs Act of 2017 and the Investing and arts district, new restaurants, new museums and many more the national average and continue to be far less expensive than Opportunity Act, Opportunity Zones are a new 10-year housing and hotel options. regions popular among young talent e.g. Portland, Seattle, 2. Federal Research Support; with National Science national community investment opportunity with the VIBRANT NEIGHBORHOODS FOR YOUNG Bay Area Los Angeles, Austin, Boston, Denver and New York. Foundation funded Programs as an Anchor potential for a 15% capital gains tax reduction as a key PEOPLE – The Brookside, Cherry Street and Florence Park The 6th Street Corridor has numerous properties that are of in growing cyber-related research, workforce and incentive. State and local governments have recently neighborhoods are thriving with young adult residents. low cost and close to downtown neighborhoods undergoing entrepreneurship in Tulsa – this includes National Science established official Opportunity Zones with a large track revitalization and The University of Tulsa. Foundation (NSF) supported programs such as Engineering RECREATION – The River Parks System and Turkey identified from downtown Tulsa to The University of Tulsa Research Center grant support (up to $6,000,000 per year), Mountain Urban Wilderness have all been redeveloped. with 6th Street as a central “back bone” to this corridor. 4 < THE UN I V E R SI T Y OF T U LSA T H E U N I V E R SI T Y O F T U L SA > 5
T U L S A E N T E R P R I S E O N C Y B E R I N N O V AT I O N , TA L E N T A N D E N T R E P R E N E U R S H I P Potential investors and consortium members in the cyberdistrict Cities with successful Opportunity Zones feature joint efforts BANKING and investments of Qualified Opportunity Funds alongside BOK Financial corporate, civic, philanthropic and university interests. Arvest Below are agencies and companies with cyberdefense needs and strong connections to Tulsa and TU that are potential ENERGY - PIPELINE INTEGRITY investors for the Tulsa Enterprise for Cyber Innovation Talent Williams Company (Tulsa, OK) and Entrepreneurship. Magellan Midstream (Tulsa, OK) Laredo (Tulsa, OK) ONEOK (Tulsa, OK) NATIONAL DEFENSE OneGas (Tulsa, OK) National Institute for Standards and Technology Phillips 66 (Bartlesville, OK) U.S. Department of Defense Anadarko (Woodlands, OK) TU is uniquely positioned among U.S. National Security Administration SemGroup (Tulsa, OK) The Secret Service universities for this work The Federal Bureau of Investigation ENERGY - GRID PROTECTION Defense Advanced Research Projects Public Service of Oklahoma INSURANCE STATE OF OKLAHOMA Experience – The University of Tulsa has been a leader Multiple Cyber Education Pathways – TU has National Association of Insurance Commissioners Oklahoma Center for Advancement of Science and in information security for the past 20 years. expanded its education pathways in cyber-related majors. Major Insurance Carriers e.g CHUBB Technology This includes: bachelor’s degrees in computer science, Blue Cross Blue Shield of Oklahoma (Tulsa, OK) Expertise – The University of Tulsa carries three NSA data analytics or computer information systems linking to Community Care (Tulsa, OK) Center of Excellence delegations including Information a minor in cybersecurity, residential and online master’s Global Health (Tulsa, OK) SMALL BUSINESS Assurance and Cyber Defense Education, Information degrees in cybersecurity and scholarships for service U.S. Small Business Administration and the HUB Zone Assurance Research and Cyber Operations. These three designations place TU among a small handful of research programs through the National Security Agency and TRANSPORTATION - TRUCKING Program - Historically Underutilized-utilized Business Zones National Science Foundation. U.S. Department of Transportation universities. National Motor Freight Traffic Association POTENTIAL TU ALUMNI AND BOARD Beyond excellent timing, there is an urgency to this Established Federal and Industry Partnerships JB Hunt Trucking (Lowell, AR) initiative: PARTNERS: – The University of Tulsa has joint programs in place John Christner Trucking (Sapulpa, OK) Experian with the U.S. Department of Defense, U.S. Department FEWER COLLEGE ELIGIBLE HIGH SCHOOL Melton Truck Lines (Catoosa, OK) Walmart of Energy, the National Security Administration, the GRADUATES – The United States is facing a 20% drop IC Bus / Navistar (Tulsa, OK) QuikTrip Department of Homeland Security, the United States Air in college eligible high school graduates beginning in Walmart (Bentonville, AR) Zest Finance Force – Tinker Air Force Base, DARPA, and the National 2025. By 2029, the U.S. workforce will face a 20% drop Amazon (Tulsa,OK) Anadarko Motor Freight Trucking Association. As well, TU hosts in college graduates. It is imperative that Tulsa attracts Macy’s (Tulsa, OK) Laredo energy research consortia with large global corporate high school graduate talent from across the nation to TU QuikTrip (Tulsa, OK) BOK Financial partners including Chevron, Exxon Mobil and Phillips 66. and their computer science, data analytics, cyber, energy Microsoft Multiple Business Sector Cyber Platforms – TU and engineering programs as a source of knowledge TRANSPORTATION - AEROSPACE Amazon – Whole Foods economy talent for the region. This initiative is part of an American Airlines (Tulsa, OK) has established cyber-related research programs in Cyber Google expansion at TU that will rapidly add 1,000 students at Spirit Aerosystems (Tulsa, OK) Defense and Offense, Cell Phone Forensics, Information Instagram The University of Tulsa. Flight Safety (Broken Arrow, OK) Security Economics, Critical Infrastructure Security – Susman-Godfrey including pipelines, electrical grid, nuclear power plants, TAX INCENTIVES SUNSET – The guide referenced Nordam (Tulsa, OK) MACCOR Heavy Vehicle Cyber Security, Applied Center for the above notes that the Opportunity Zone program has the Unit Corp (Tulsa, OK) Cloud of Things and Human Behavioral Vulnerabilities in potential to deploy hundreds of billions of re-investment Honeywell Aerospace (Tulsa, OK) Information Security. dollars but this tax incentive sunsets in 10 years. 6 < THE UN I V E R SI T Y OF T U LSA T H E U N I V E R SI T Y O F T U L SA > 7
T U F A C U LT Y T U F A C U LT Y Tyler Moore Rose Gamble Tyler Moore is the Tandy Associate Professor of Cybersecurity and Rose Gamble is the Tandy Professor of Computer Science & Engineering Information Assurance in the Tandy School of Computer Science at in the Tandy School of Computer Science at The University of Tulsa. As The University of Tulsa. His research applies methods from economics director of the Software Engineering and Architecture Team, her research to improve cybersecurity. For example, his research collects and analyzes activities involve security assurance for autonomous and self-adaptive cybercrime data to quantify the costs and benefits of investments into systems funded by the Air Force Research Laboratory Information security controls. Moore’s Science article, co-authored with Ross Anderson, Directorate (AFRL-ID), drone coordination and path planning for is recognized for providing a canonical introduction to applying economics mission success funded under a separate program at AFRL-ID, heavy to explain cybersecurity challenges. He is leading a $1.5 million, three- vehicle cybersecurity testbed development funded by the National Science year joint effort with Carnegie Mellon University and Delft University of Foundation (NSF), human subjects studies in trust and suspicion funded Technology to develop a better understanding of the relationship between by the Air Force Research Laboratory Human Performance Wing (AFRL- cybersecurity spending and secure outcomes. This project, funded by the HPW). Gamble has just begun leading a new effort with collaborators Department of Homeland Security and set to begin in January 2019, from Michigan State University on certifying at runtime that self-healing will also involve collaborations with private industry partners at Fox-IT, software programs maintain compliance with security constraints. This SELECTED PUBLICATIONS IN SELECTED PUBLICATIONS IN SecurityScoreCard and CyberCube. Moore also seeks to explain how effort will extend her work on wearable and IoT device self-protection CYBERSECURITY CYBERSECURITY attackers and defenders operate through empirical observation. One such to autonomous robots. Gamble holds a patent for an Auditable Multi- effort is an investigation into how security shocks affect cryptocurrency R. Anderson and T. Moore, The Claim Security Token that allows forensic analysis of message exchanges M. Hale, K. Lofty, R. Gamble, C. markets. In collaboration with economists from Tel Aviv University, Economic of Information Security, Science, by aggregating identity-related information that is transmitted among Walter, and J. Lin, Developing a platform the NSF-BSF funded project (awarded 2017) has identified how price 314(5799):610--613, 2006. composed web services. She established the university’s Applied Research to evaluate and assess the security of manipulation has inflated the price of Bitcoin, documented pump-and- Center for the Cloud of Things in January 2016 that collaborates with wearable devices, Digital Communications and N. Gandal, J.T. Hamrick, T. Moore, and dump schemes targeting thinly traded cryptocurrencies and examined industry partners to develop client-based platforms and scenarios for Networks, Oct. 2018. T. Obermann. Price manipulation in the the impact of denial-of-service attacks on currency exchanges. Broadly Bitcoin ecosystem, Journal of Monetary experimentation, implement cloud services for internet-enabled devices, C. Walter, I. Riley, and R. Gamble, speaking, his research is aimed at making cybersecurity more scientifically Economics, 95:86--96, May 2018. and perform security and predictive analytics on proprietary data. The Securing Wearables through the Creation grounded. His NSF CAREER project (awarded 2017) is focused on algorithms developed under those contracts provide value-added to the of a Personal Fog, in the Proceedings of the developing more robust indicators of cybercriminal activity. These S. Tajalizadehkhoob, T. van Goethem, supporting industries in terms of predicting mechanical degradation to 51st Hawaii International Conference on System indicators are being collected longitudinally in order to more reliably M. Korczyński, A. Noroozian, R. ensure timely maintenance and reduce monetary losses, intrusion detection Sciences, nominated for Best Paper Award, establish whether defenders are making quantifiable improvements to Böhme, T. Moore, W. Joosen, and M. on network communications from a well site to an online dashboard for Jan. 2018. security over time. van Eeten. Herding vulnerable cats: A operations analysis, and more recently blockchain verification of IoT statistical approach to disentangle joint firmware device updates to aid in supply chain tracking. In addition to M. Hale and R. Gamble, Semantic responsibility for web security in shared support from AFRL and NSF, Gamble’s research program has been Hierarchies for Extracting, Modeling, and hosting, In ACM SIGSAC Conference on funded by the U.S. Air Force Office of Scientific Research, DARPA, the Connecting Compliance Requirements in Computer and Communications Security (CCS Department of Energy, the state of Oklahoma and local industry. Information Security Control Standards, ‘17), 2017. Requirements Engineering, pp. 1-38, Dec. 2017. M. Vasek, J. Wadleigh, and T. Moore. Hacking is not random: a case-control S. Alqahtani and R. Gamble, Verifying study of webserver-compromise risk, the Detection Results of Impersonation IEEE Transactions on Dependable and Secure Attacks in Service Clouds, Advances in Computing, 13(2):206--219, 2016. Science, Technology, and Engineering Systems, 2(3): 449-459, 2017. R. Böhme, N. Christin, B. Edelman, and T. Moore. Bitcoin: Economics, technology, M. Hale, C. Walter, J. Lin, and R. and governance, Journal of Economic Gamble, A Priori Prediction of Phishing Perspectives, 29(2):213--38, 2015. Victimization based on Structural Content Factors, International Journal of Services Computing (IJSC), 5(1), 2017, pp. 1-13. 8 < THE UN I V E R SI T Y OF T U LSA T H E U N I V E R SI T Y O F T U L SA > 9
T U F A C U LT Y T U F A C U LT Y John Hale Mauricio Papa John Hale holds the Tandy Endowed Chair in Bioinformatics Mauricio Papa is an Associate Professor in the Tandy School of and Computational Biology as a Professor in the Tandy School Computer Science at The University of Tulsa and Director of of Computer Science at The University of Tulsa. He is a the Institute for Information Security (iSec). Papa received his founding member of the TU Institute of Bioinformatics and bachelor of science in electrical engineering from Universidad Computational Biology (IBCB), and a faculty research scholar Central de Venezuela in 1992 and his master of science in in the Institute for Information Security (iSec). His research electrical engineering and doctorate in computer science from has been funded by the U.S. Air Force, the National Science TU in 1996 and 2001, respectively. His primary research area Foundation (NSF), the Defense Advanced Research Projects is critical infrastructure protection. His team has designed and Agency (DARPA), the Army Research Office (ARO), National constructed process control testbeds to support cybersecurity Security Agency (NSA), the National Institutes of Health (NIH) efforts in critical infrastructure protection. As part of his efforts and the National Institute of Justice (NIJ). These projects include in that area, he has focused his work in the development of research on neuroinformatics, cybertrust, information privacy, situational awareness tools as well as extending traditional IT attack modeling, secure software development, high performance solutions for intrusion detection systems and firewalls for their SELECTED PUBLICATIONS IN SELECTED PUBLICATIONS IN computing and cyberphysical system security. He has testified use in process control systems as supported by an industry CYBERSECURITY CYBERSECURITY before Congress on three separate occasions as an information contract through the Applied Research Center for the Cloud security expert, and in 2004 was awarded a patent on technology B. Brummel, J. Hale and M. Mol, Training Cyber of Things. He also conducts research in network security and W. M. Nichols, P. J. Hawrylak, J. C. Hale and to thwart digital piracy on file sharing networks. In 2000, Hale Security Personnel, The Psychosocial Dynamics of intelligent control systems. More recently, he developed an M. Papa, Methodology to estimate attack graph earned a prestigious NSF CAREER award for his educational Cyber Security Work, S. Zaccaro, R. Dalal, and L. interest in IoT devices and the use of machine-learning and system state from a simulation of a nuclear and research contributions to the field of information assurance. Tetrick (Eds.), Routledge, Boca Raton, FL, 2015. data analytics to help model multiphase flow properties in reactor system, in the Proceedings of Resilience Week collaboration with The University of Tulsa Fluid Flow Projects (RWS) 2018, pp. 84-87, August 2018. M. Hale, R. Gamble, J. Hale, M. Haney, J. Lin, and C. Walter, Measuring the Potential group. W. Nichols, P. Hawrylak, J. Hale and M. for Victimization in Malicious Content, in the Papa, Introducing Priority into Hybrid Attack Proceedings of the 22nd IEEE International Conference on Graphs, in the Proceedings of 12th Annual Cyber and Web Services, pp. 305-312, June 2015. Information Security Research Conference, Article No. 12, April 2017. P. Hawrylak, C. Hartney, M. Papa and J. Hale, Using Hybrid Attack Graphs to Model and J. Nivethan and M. Papa, On the use of open- Analyze Attacks against the Critical Information source firewalls in ICS/SCADA systems, Infrastructure, Critical Information Infrastructure Information Security Journal: A Global Perspective, Protection and Resilience in the ICT Sector, S. Bologna, Taylor & Francis, ISSN: 1939-3555 (Print), 1939- P. Theron (Eds.), IGI Global, Hershey, PA, pp. 173- 3547 (Online), 2016. 197, 2013. J. Nivethan and M. Papa, A Linux-based firewall K. Clark, E. Singleton, S. Tyree and J. Hale, Strata- for the DNP3 protocol (Best Paper Award), in the Gem: risk assessment through mission modeling, in Proceedings of the IEEE International Symposium on the Proceedings of the Fourth ACM workshop on Quality Technologies for Homeland Security, May 2016. of Protection, pp. 51 - 58, Alexandria, Virginia, USA, J. Nivethan and M. Papa, Dynamic rule October, 2008. generation for SCADA intrusion detection, in J. Hale, M. Papa and S. Shenoi, Programmable the Proceedings to the IEEE International Symposium on access control, Journal of Computer Security, vol. 11, Technologies for Homeland Security, May 2016. no. 3, IOS Press, Amsterdam, The Netherlands, pp. 331-351, 2003. 10 < THE UN I V E R SI T Y O F T U LSA T H E U N I V E R SI T Y O F T U L SA > 11
T U F A C U LT Y T U F A C U LT Y Jeremy Daily Peter J. Hawrylak Jeremy Daily is an Associate Professor in the Department of Mechanical Peter J. Hawrylak is an Associate Professor in the Department of Electrical Engineering at The University of Tulsa. His funding for research and and Computer Engineering at The University of Tulsa. His research education in heavy vehicle cybersecurity to address transportation as area focuses on hardware design and wireless system development, with a critical infrastructure concern comes from both public and private an emphasis on cybersecurity for those systems. He is also active in the sources. Both the Department of Defense (DoD) and the National high-performance computing community in the area of reconfigurable Science Foundation (NSF) currently provide support. The heavy vehicle logic and heterogeneous computing. Hawrylak currently holds 13 industry represented by the National Motor Freight Traffic Association patents in the areas of Radio Frequency Identification, wireless systems, (NMFTA) has recognized TU as a performer in talent generation energy harvesting, and cybersecurity; several of which have been for the cybersecurity workforce needs of the transportation industry. commercialized. His research has been funded by the U.S. Department of The NMFTA and other industry partners currently fund the Student Defense (DoD), U.S. Army, U.S. Department of Energy (DOE), National CyberTruck Experience (CyTeX) that teaches engineering students Science Foundation (NSF), U.S. Department of Transportation (DOT) interested in transportation fundamental skills related to cybersecurity and private industry. These research efforts are focused on building with hands-on research activities. This exclusive Tulsa program has smart infrastructure, designing tools to help secure the next generation SELECTED PUBLICATIONS IN SELECTED PUBLICATIONS IN successfully placed engineers into automotive cybersecurity jobs. of nuclear reactors, and developing cyberattack modeling and analysis CYBERSECURITY CYBERSECURITY Creating the CyberTruck Challenge, administered by TU for the tools to theorize new attack vectors and countermeasures to those attack first time in 2017, was a significant achievement toward broadening J. Daily, and B. Gardiner, Cyber security vectors. Hawrylak is a senior member of the IEEE and IEEE Computer W. Nichols, P. J. Hawrylak, J. Hale, and participation in cybersecurity training across the United States and Considerations for Heavy Vehicle Event Data Society. He is currently secretary of the Tulsa Section of the IEEE. He M. Papa, Methodology to Estimate Attack Canada. Students gain skills through lectures and exercise those skills on Recorders, in the Proceedings of the 6th ESCAR served as chair of the RFID Experts Group (REG) of Association for Graph System State from a Simulation of actual vehicles provided by the original equipment manufacturers, like USA - The World’s Leading Automotive Cyber Automatic Identification and Mobility (AIM) in 2012-2013. Peter received a Nuclear Research Reactor, Resilience Week Cummins and PACCAR. The CyberTruck Challenge was such a success Security Conference, June 2018. AIM Inc.’s Ted Williams Award in 2015 for his contributions to the (RWS), pp. 84-87, 2018. that it became a self-sustaining nonprofit organization after the first J. Daily, U. Jonson, and R. Gamble, Talent RFID industry. Hawrylak is publication chair of the International IEEE J. Trewitt, P. Hawrylak, and M. Keller, year. Another exciting contribution to the heavy vehicle cybersecurity Generation for Vehicle Cyber Security, 5th RFID Conference and is editor-in-chief of the International Journal of Time delay tags for commercial ground ecosystem is a company, Synercon Technologies, started by TU students ESCAR USA - The World’s Leading Automotive Radio Frequency Identification Technology and Applications (IJRFITA), a journal penetrating radars, IEEE Radar Conference and faculty using their intellectual property. It provides digital forensics Cyber Security Conference, June 2017. published by InderScience Publishers, which focuses on the application (RadarConf18), pp. 1466-1471, 2018. solutions for heavy vehicle event data recorders with customers all over and development of RFID technology. Hawrylak is also editor-in-chief of the United States and Canada. Synercon Technologies was founded by S. Mukherjee, H. Shirazi, I. Ray, J. Daily, the IEEE RFID Virtual Journal, which provides a single source for high- R. Raval, A. Maskus, B. Saltmiras, Daily in 2013 and sold to the Dearborn Group in Michigan in 2018. and R. Gamble, Practical DoS Attacks on quality and high-impact publications in the areas of RFID and Internet of M. Dunn, P.J. Hawrylak and J. Hale, Embedded Networks in Commercial Vehicles, Things (IoT). Competitive Learning Environment In: Ray I., Gaur M., Conti M., Sanghi D., for Cyber-Physical System Security Kamakoti V. (eds) Information Systems Experimentation, in the Proceedings of the Security. ICISS 2016. Lecture Notes in Computer 1st International Conference on Data Intelligence Science, vol 10063. Springer, Cham, 2016. & Security (ICDIS), pp. 211-218, 2018. J. Daily, R. Gamble, S. Moffitt, C. Raines, et W. Nichols, Z. Hill, P. Hawrylak, J. Hale, al., Towards a Cyber Assurance Testbed for and M. Papa, Automatic Generation of Heavy Vehicle Electronic Controls, SAE Int. J. Attack Scripts from Attack Graphs, in the Commer. Veh. Best Paper Award, 9(2):339-349, Proceedings of the 1st International Conference 2016. on Data Intelligence & Security (ICDIS), pp. 267-274, 2018. J. Daily, J. Johnson, and A. Perera, Recovery of Partial Caterpillar Snapshot Event Data Z. Hill, W.M. Nichols, M. Papa, J.C. Resulting from Power Loss, SAE Technical Hale, and P.J. Hawrylak, Verifying Attack Paper 2016-01-1493, SAE World Congress. Graphs through Simulation, Resilience Week (RWS), pp. 64-67, 2017. 12 < THE UN I V E R SI T Y O F T U LSA T H E U N I V E R SI T Y O F T U L SA > 13
T U F A C U LT Y T U F A C U LT Y Ido Kilovaty Bradley Brummel Ido Kilovaty is the Frederic Dorwart Endowed Assistant Professor Bradley Brummel is an Associate Professor of Psychology at of Law at The University of Tulsa. He comes to the College of The University of Tulsa. He received his PhD in Industrial- Law after two years as a Research Scholar in Law at Yale Law Organizational Psychology from the University of Illinois at School. At Yale, he was a Cyber Fellow at the Center for Global Urbana-Champaign. He conducts research on training and Legal Challenges, and a Resident Fellow at the Information development in the workplace with a special focus on simulation Society Project, where he remains an affiliated fellow. Kilovaty methods, professional development coaching and ethics. His is also a 2018-19 Cybersecurity Policy Fellow at New America. research has been funded but the National Science Foundation He specializes in the intersection of technology, law and society, (NSF) and the U.S. Air Force Office of Sponsored Research. Dr. with a focus on cybersecurity – both domestic and international. Brummel’s research has been published in journals such as the His specific areas of research include cybersecurity law, internet Journal of Applied Psychology, Human Relations, Journal of Management, governance, and domestic and global technology regulation. His and Personnel Psychology. recently authored “Freedom to Hack,” which proposes a solution of ethical hacking for the improvement of smart-device security is SELECTED PUBLICATIONS IN SELECTED PUBLICATIONS IN forthcoming in the Ohio State Law Journal and “Legally Cognizable CYBERSECURITY CYBERSECURITY Manipulation” which explores the relationship between novel breach-related harms and data-breach law is forthcoming in I. Kovalty, Legally Cognizable Manipulation, to B.J. Brummel, Decision-making Cues Related to the Berkeley Technology Law Journal. His work has also appeared appear in the Berkeley Technology Law Journal, 2019. Trust. Invited presentation at the Organizational in the Harvard National Security Journal, Michigan Telecommunications Sciences and Cybersecurity Workshop, July 2018. I. Kovalty, Freedom to Hack, to appear in the Ohio and Technology Law Review, Duke Law & Technology Review, Columbia State Law Journal, 2019. B.J. Brummel, D. Cosley, R. Dalal, B. Fidler, Science and Technology Law Review and more. Kilovaty’s op-eds and and S. Straus, Interdisciplinary Funding and essays appeared at Harvard Law Review Blog, Lawfare, Just I. Kovalty, Doxfare – Politically Motivated Leaks Publications. Panel Discussion at the Organizational Security, WIRED, and TechCrunch. and the Future of the Norm on Non - Intervention Sciences and Cybersecurity Workshop, George Mason in the Era of Weaponized Information, Harvard University, April 2018. Law School National Security Journal, vol. 9, pp. 146- 179, 2018. B.J. Brummel, J. Hale, and M.J.Mol, Training cybersecurity personnel, in, The Psychosocial I. Kovalty, Virtual Violence - Disruptive Dynamics of Cyber Security, S. J. Zaccaro, R. S. Cyberspace Operations as “Attacks” under Dalal, L. E. Tetrick, & J. A. Steinke (Eds.), pp. International Humanitarian Law, Michigan 217-239, New York: Routledge, 2016. Telecommunications & Technology and Law Review, vol. 23, no. 1, pp. 113-146, 2016. R.E. Beyer, and B.J. Brummel, Implementing effective cybersecurity training for end users I. Kovalty, ICRC, NATO, and the U.S. - Direct of computer networks, in Society for Human Participation in “Hacktivities” - Targeting Private Resource Management and Society for Industrial and Contractors in Cyberspace Under the Law of Organizational Psychology Science of Human Resource Armed Conflict, Duke Law & Technology Review, vol. Series: Promoting Evidence-Based HR, 2015. 15, no. 1, pp. 1-38, 2016. J. Staggs, R. Beyer, M. Mol, M. Fisher, B. Brummel, and J. Hale, A perceptual taxonomy of contextual cues for cyber trust, Journal for The Colloquium for Information System Security Education (CISSE), vol. 2, pp. 152-169, 2014. 14 < THE UN I V E R SI T Y O F T U LSA T H E U N I V E R SI T Y O F T U L SA > 15
T U F A C U LT Y SPONSORED CYBERSECURITY RESEARCH ACTIVITIES Sal Aurigemma Security assurance for self-adaptive and autonomous systems Sal Aurigemma is an Assistant Professor of Computer Information Systems where he teaches Telecommunications, RUNTIME ADAPTATION AND HEALING CAN ADDRESS ENVIRONMENTAL Information Security, and Business Programming Concepts UNCERTAINTIES AND SECURITY THREATS for the Collins College of Business School of Accounting and n Continuous monitoring provides situational awareness Computer Information Systems at The University of Tulsa. n Cloud-based and embedded decision analysis A Navy veteran of more than 20 years (both on active duty and the reserves), he served as a submarine officer on the MAIN OBJECTIVE USS PINTADO (SSN 672) and later as a Naval Intelligence n Perform runtime assessment of an adaptation’s risk to violate critical security controls Officer deployed to Afghanistan in support of Operation Enduring Freedom. After leaving active duty, he worked RESULTS more than a decade in the Information Technology field n Model the security V&V&C processes with confidence levels as security control contracts supporting the U.S. Department of Defense (DoD), serving n Connect contracts through dependent constraints in a variety of roles from system administration, project n Embed model with utility functions for runtime risk assessment of potential adaptations and patches SELECTED PUBLICATIONS IN n Reassign security constraint compliance confidence values post adaptation management, and system architecture analysis and design. CYBERSECURITY A major emphasis of his IT work dealt with managing the fusion of disparate geospatial information systems and tactical S. Aurigemma, T. Mattson, and L. Leonard, Evaluating data links and sharing data securely across multiple security the Core and Full Protection Motivation Theory domains and infrastructures. His research explores employee Nomologies for the Voluntary Adoption of Password information security policy compliance, improving end- Manager Applications, AIS Transactions on Replication Research, April 2018. user and small business information security practices, and MAPE Control Loop end-user computing focusing on business spreadsheet error S. Aurigemma and T. Mattson, Exploring the Effect of Select and tailor detection. He has published in Computers & Security, Information Uncertainty Avoidance on Taking Voluntary Protective security control and Computer Security, Decision Support Systems, the Journal of Security Actions, Computers & Security, vol. 73, pp. 219- Issues Organizational and End User Computing, and the Journal of MONITOR ANALYZE 234, March 2018. Information Systems Security and was awarded the Collins College S. Aurigemma and T. Mattson, Privilege or Procedure: Express control of Business Mayo Teaching Excellence Award for 2015-2016. Findings as FR or NFR Evaluating the Effect of Employee Status on Intent to Comply with Interactive Security Controls, Computers & Chosen Security, vol. 66, pp. 218-234, May 2017. Plan EXECUTE PLAN Perform certification S. Aurigemma and T. Mattson, T. (2017) Deterrence and Punishment Experience Impacts on ISP Compliance of mechanism Attitudes. Information and Computer Security 25(4). Events Adaptation ASSESSED EXPECTED S. Aurigemma and L. Leonard, The Influence of RISK CHANGES Employee Affective Organizational Commitment on Security Policy Attitudes and Compliance Intentions, Journal of Information System Security, 11(3), 201-222, 2016. Model the SYSTEM certification strategy Certification strategy modeling & adaptation Assess risk to certification strategy reuse assessment process 16 < THE UN I V E R SI T Y O F T U LSA T H E U N I V E R SI T Y O F T U L SA > 17
SPONSORED CYBERSECURITY RESEARCH ACTIVITIES SPONSORED CYBERSECURITY RESEARCH ACTIVITIES Wearable security WEARABLE DATA IS NOT SECURE CLOUD n Bluetooth Communication is easy to intercept and decrypt n Wearables do not implement sufficient security measures n Sniffing, tracking, and injection can occur to - Gather intel - Disable device SIMULATED WEARABLE TESTBED n Allows for experimentation with attacks at the network edge n Allows for the development and testing of mitigation Blockchain to secure strategies to secure wearables at runtime n Assesses new network architectures to secure data oil & gas supply chain transmissions RESULTS n Wearables choose how to self-adapt their security posture at runtime based on embedded knowledge of critical requirements OIL & GAS SUPPLY CHAIN IS VULNERABLE TO n App development allows for secure communication among Application COUNTERFEIT MATERIALS OR PRODUCTS AND THEFT peer wearables app app app Layer n Lacks assured logistic tracking mechanisms along the value chain MAJOR CHALLENGES Service Layer n Monitoring raw materials and products with IoT devices n Providing IoT device firmware security during OTA updating Vendors Access Authentication INVESTIGATIONS Blockchain Firmware Update n Adopt blockchain technology to secure reliable IoT firmware update Layer with blockchain across supply chain Concensus Protocols - IoT device to vendor service authentication Distributed Ledger - Firmware update verification n Determine appropriate supply chain sector integration into blockchain Proxy Layer network - Well site reservoir-related IoT device meter readings Gateway - Petroleum crude oil and raw natural gas transportation - Process and purification TLS DTLS Protocol Layer CoAP ZigBee MQTT Hardware Layer 18 < THE UN I V E R SI T Y O F T U LSA T H E U N I V E R SI T Y O F T U L SA > 19
SPONSORED CYBERSECURITY RESEARCH ACTIVITIES SPONSORED CYBERSECURITY RESEARCH ACTIVITIES SCADA operations monitoring OIL & GAS WELLS USE VULNERABLE Polling Cycle Analysis (5-min cycle, 2 months) Heavy vehicle NETWORKS, REQUIRING n Situational awareness (MODBUS) 400 cybersecurity n Traditional IDS techniques for real-time anomaly detection n Statistical modeling and machine learning for pattern 300 analysis n Modified file-based session analysis for online use 200 REAL TIME AND OFFLINE TESTING n Actual packet captures moved off site 100 Hourly Averages n Network emulator replays captures Daily Averages Weekly Averages n 1+ year’s worth of operational data 0 Monthly Averages DIGITAL FORENSICS OF HEAVY VEHICLE ELECTRONIC CONTROL UNITS 0 10 20 30 40 50 60 HEAVY VEHICLE TESTBED DESIGN AND IMPLEMENTATION CHALLENGES TO ADDRESS n Allows for remote experimentation n Scalability n Command and control CAN DATA COLLECTION AND ANALYSIS EDUCATIONAL INITIATIVES n Student CyberTruck Experience Scada Device Network Traffic n TU co-founded the CyberTruck Challenge Connection SCADA Profiles Device Manager List Sensors Vehicle Diagnostic Adapter Diagnostic Port Packet Layer Beagle Bone Brake Controller Black Flow Layer Anomaly Detection Rules Interflow Layer Wireless Communications Software Defined Radio Statistical Layer Infotainment Anomaly Detection Sensor CAN bus Engine Control Module Sensor Emulation Ethernet Switch Simulation and User Interface Server 20 < THE UN I V E R SI T Y O F T U LSA T H E U N I V E R SI T Y O F T U L SA > 21
SPONSORED CYBERSECURITY RESEARCH ACTIVITIES SPONSORED CYBERSECURITY RESEARCH ACTIVITIES Cyberphysical system security: theory Develop techniques and solutions for Assets and Network Connections practical formal analysis of security Manual SCRAM System properties in cyberphysical systems SeismicSensor Power Sensor (CPSs) Building Control System Recorder Evacuation Fuel Temperature HYBRID ATTACK GRAPHS Sensor Beam Room Auto-SCRAM System (HAGS): CAPTURE ALL RO Station Control Rod Scram Chain Movement POSSIBLE ATTACK Controller Reactor- VECTORS FOR CPSS Coolant Physical Conditions Control/Circulation n Modeling and generation – System Critical Infrastructure Automatic model acquisition and Coolant Temperature scalable generation Sensor Protection Lab n Analysis – Critical paths, Coolant Loss reachability, minimal cost Sensor hardening Building Airborne Ventilation High Flux Period Amp Logn H.V. Failure CIC H.V. Failure Radiation Sensor Sensor System Detector Monitors Monitor APPLIED RESEARCH AND EXPERIENTIAL ELECTRIC POWER SUBSTATION LEARNING n Dual 208V 3 phase inputs n Cyberphysical systems security (ring structure), 3KVA Max. Power 0 n Improved intrusion detection n 2 PLCs, fully networked (using DNP3 over Ethernet for n Event monitoring in energy plants control) ownTempSensor(tempSensor1) ownTempSensor(tempSensor2) n Integrity and auditing for settings on SCADA devices 1 2 incTempReading(tempSensor1) ownTempSensor(tempSensor2) ownTempSensor(tempSensor2) incTempReading(tempSensor2) 3 4 5 tempSensor(tempSensor1, incTempReading(tempSensor1) incTempReading(tempSensor2) ownTempSensor(tempSensor1) tempScram(tempSensor2, tempSensor2, tempSensor1, automaticScram) automaticScram) ownTempSensor(tempSensor2) 7 6 8 9 Unsafe State tempScram(tempSensor2, tempScram(tempSensor1, tempSensor1, tempSensor2, automaticScram) automaticScram) incTempReading(tempSensor2) incTempReading(tempSensor1) 11 10 12 tempScram(tempSensor1, tempSensor2, automaticScram) 13 22 < THE UN I V E R SI T Y O F T U LSA T H E U N I V E R SI T Y O F T U L SA > 23
SPONSORED CYBERSECURITY RESEARCH ACTIVITIES SPONSORED CYBERSECURITY RESEARCH ACTIVITIES Cyberphysical system security: Cybersecurity analysis for nuclear testbed reactor control systems CONSTRUCT A CPS TESTBED TO SUPPORT CYBERSECURITY RECOMMENDATIONS AND GUIDANCE SECURITY RESEARCH AND EXPERIENTIAL n New nuclear reactor designs LEARNING n Upgrades of existing plants and nuclear research reactors CPS COMPETITIVE LEARNING ARENA – A NUCLEAR REACTOR TESTBED FULLY INSTRUMENTED, HACKABLE GAME n Evaluate impact of cyberattacks ENVIRONMENT USING ROBOTIC CARS PLAYING n Quantify effectiveness countermeasure “CAPTURE THE FLAG” TOOLS TO IDENTIFY CYBERATTACK VECTORS AND POSSIBLE COUNTERMEASURES n Technologies – Wi-Fi, NFC, Windows, Linux, Teensy, JavaScript, n Map attack surface Electron, TCP/IP n Countermeasure requirements n Blended attack vectors: Cyber – Network, wireless, OS, API; Physical – Battery, Temperature, Kinetic, Spatial TOOL TO IDENTIFY CRITICAL ASSETS (CAS) AND CRITICAL DIGITAL ASSETS (CDAS) n Saves hundreds of man-hours of effort n Provides an audit trail with evidence Arena Communication Protocol SIMULATION SPACE AT TACK GRAPH SPACE Attack Injected Script Script Command Script Parser Generator Packets Network Configuration Simulated Network Network Pathing Graph Models Component Generator Models Tags Simulation Simulation Exploit State Database Records State File Values Analysis Schema Exploit Templates 24 < THE UN I V E R SI T Y O F T U LSA T H E U N I V E R SI T Y O F T U L SA > 25
SPONSORED CYBERSECURITY RESEARCH ACTIVITIES SPONSORED CYBERSECURITY RESEARCH ACTIVITIES Cybersecurity policy SECURITY ECONOMICS – COLLECT AND ANALYZE CYBERCRIME DATA TO n Quantify costs and benefits of cyber investment n Explain how attackers and defenders operate n Make cybersecurity more scientifically grounded PROFESSOR MOORE REGULARLY BRIEFS LEADERS IN GOVERNMENT ON CYBERSECURITY n Testimony on harms arising from the Equifax breach to U.S. Senate Committee of the Judiciary’s Subcommittee on Privacy, Technology and the Law n “Lessons from the Economics of Cybersecurity”: JASON Summer Study on Cyber S&T n Panel on incentives to invest in cybersecurity for Federal Trade Commission Hearing on Data Security stopbadware.org JUDICIARY SUBCOMMITTEE SD-226 EDUCATES USERS AND WEBSITE OPERATORS ABOUT MALWARE n Public clearinghouse lets anyone query whether websites are compromised n 2M+ annual visits to stopbadware.org LARGEST FREE WEB MALWARE TESTING AND REVIEW PROGRAM n Anyone can request independent review of URLs blacklisted for malware by StopBadware’s data providers: Google, ThreatTrack Security, and NSFocus n StopBadware has helped de-blacklist 200,000+ websites n Malware testing and review carried out by TU undergraduate researchers DATA USED AS INPUT TO RESEARCH 26 < THE UN I V E R SI T Y O F T U LSA T H E U N I V E R SI T Y O F T U L SA > 27
National Cyber Insurance Institute Tour of The University of Tulsa Cybersecurity Program January 7, 2019 • 1:00 p.m. – 4:00 p.m. Agenda 1:00 p.m. Keplinger Hall – Dean’s Conference Room (Enter NE Door, turn left – Dean’s Conference Room on left) • Introductions and Opening Remarks, President Gerry Clancy • Opening Remarks 1:30 p.m. Board Shuttle at Northeast Entrance, Keplinger Hall 1:35 p.m. Arrive Henneke 1:40 p.m. Faculty/Student Presentation in 3rd Floor Labs 2:50 p.m. Board Shuttle to Joe’s Garage 2:55 p.m. Faculty/Student Presentation 3:05 p.m. Board Shuttle – Depart Joe’s Garage 3:10 p.m. Shuttle Arrives at Keplinger 3:15 p.m. Keplinger Hall – Dean’s Conference Room Next Step Discussion – Dr. Gerry Clancy 4:00 p.m. Adjournment 28 < THE UN I V E R SI T Y O F T U LSA T H E U N I V E R SI T Y O F T U L SA > 29
800 SOUTH TUCKER DRIVE • TULSA, OK 74104 engineering.utulsa.edu/computer-science The University of Tulsa does not discriminate on the basis of personal status or group characteristics including, but not limited to individuals on the basis of race, color, religion, national or ethnic origin, age, sex, disability, veteran status, sexual orientation, gender identity or expression, genetic information, ancestry, or marital status. Questions regarding this policy may be addressed to the Office of Human Resources, 918-631-2616. For accommodation of disabilities, contact TU’s 504 Coordinator, Dr. Tawny Rigsby, 918-631-2315. To ensure availability of an interpreter, five to seven days notice is needed; 48 hours is recommended for all other accommodations. TU#19005 30 < THE UN I V E R SI T Y O F T U LSA
You can also read